# code-pattern-risk-scanner MCP server

Cloudflare Workers MCP server: code-pattern-risk-scanner

## Links
- Registry page: https://www.getdrio.com/mcp/io-github-lazymac2x-code-pattern-risk-scanner
- Repository: https://github.com/lazymac2x/code-pattern-risk-scanner-api

## Install
- Endpoint: https://api.lazy-mac.com/code-pattern-risk-scanner/mcp
- Auth: Not captured

## Setup notes
- Remote endpoint: https://api.lazy-mac.com/code-pattern-risk-scanner/mcp

## Tools
- scan_patterns - Scan JS/TS code for 26 security and performance patterns Endpoint: https://api.lazy-mac.com/code-pattern-risk-scanner/mcp
- detect_antipatterns - Detect antipatterns with optional severity filter Endpoint: https://api.lazy-mac.com/code-pattern-risk-scanner/mcp
- risk_score - Calculate 0-100 risk score with severity breakdown Endpoint: https://api.lazy-mac.com/code-pattern-risk-scanner/mcp
- suggest_refactor - Get prioritized step-by-step refactoring suggestions Endpoint: https://api.lazy-mac.com/code-pattern-risk-scanner/mcp
- security_check - Security-focused scan returning vulnerable | at-risk | secure status Endpoint: https://api.lazy-mac.com/code-pattern-risk-scanner/mcp

## Resources
Not captured

## Prompts
Not captured

## Metadata
- Owner: io.github.lazymac2x
- Version: 1.0.0
- Runtime: Streamable Http
- Transports: HTTP
- License: Not captured
- Language: Not captured
- Stars: Not captured
- Updated: May 16, 2026
- Source: https://registry.modelcontextprotocol.io
